Publications

Publications from ADSC’s Trustworthy and Secure Cyber-Plexus program and related/past projects.

2019

  • Daisuke Mashima, Yuan Li, and Binbin Chen
    Who’s Scanning Our Smart Grid? Empirical Study on Honeypot Data
    To appear at IEEE Global Communications Conference (GLOBECOM’19)
    Waikoloa Village, USA, December 2019 [pdf]
  • Xin Lou, Cuong Tran, David Yau, Rui Tan, Hongwei Ng, Tom Z.J. Fu and Marianne Winslett
    Learning-Based Time Delay Attack Characterization for Cyber-Physical Systems
    To appear at IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grid (SmartGridComm’19)
    Beijing, China, October 2019
  • Ertem Esiner, Daisuke Mashima, Binbin Chen, Zbigniew Kalbarczyk, and David Nicol
    F-Pro: a Fast and Flexible Provenance-Aware Message Authentication Scheme for Smart Grid
    To appear at IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm’19)
    Beijing, China, October 2019 [pdf]
  • Partha Biswas, Heng Chuan Tan, Qingbo Zhu, Yuan Li, Daisuke Mashima, and Binbin Chen
    A Synthesized Dataset for Cybersecurity Study of IEC 61850 based Substation
    To appear at IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm’19)
    Beijing, China, October 2019 [pdf]
  • Yan Li, Zilong Wang, Yingjiu Li, Robert Deng, Binbin Chen, Weizhi Meng, Hui Li
    A Closer Look Tells More: A Facial Distortion Based Liveness Detection for Face Authentication
    In Proceedings of the ACM Asia Conference on Computer & Communications Security (AsiaCCS’19)
    Aukland, New Zealand, July 2019 [pdf]
  • Cheng Gong, Ye Lu, Tao Li, Xiaofan Zhang, Deming Chen and Yao Chen
    μL2Q: An Ultra-Low Loss Quantization Method for DNN Compression
    In Proceedings of the 2019 International Joint Conference on Neural Networks (IJCNN’19)
    Budapest, Hungary, July 2019
  • Yan Yang, Xia Yin, Xingang Shi, Zhiliang Wang, He Jiong, Tom Z.J. Fu and Marianne Winslett
    Inter-domain Routing Bottlenecks and Their Aggravation
    Elsevier Journal of Computer Networks
    June 2019 [pdf]
  • Daisuke Mashima, Ramkumar Rajendran, Bin Zhou, Binbin Chen, and Biplab Sikdar
    On Optimization of Command-Delaying for Advanced Command Authentication in Smart Grid Systems
    In Proceedings of the IEEE Power and Energy Society Innovative Smart Grid Technologies Asia (ISGT Asia’19)
    Chengdu, China, May 2019 [pdf]
  • Hengchuan Tan, Carmen Cheh, Binbin Chen, and Daisuke Mashima
    Tabulating Cybersecurity Solutions for Substations: Towards Pragmatic Design and Planning
    In Proceedings of the IEEE Power and Energy Society Innovative Smart Grid Technologies Asia (ISGT Asia’19)
    Chengdu, China, May 2019 [pdf]
  • Xin Lou, Cuong Tran, Rui Tan, David Yau, and Zbigniew Kalbarczyk
    Assessing and Mitigating Impact of Time Delay Attack: A Case Study for Power Grid Frequency Control
    In Proceedings the 10th ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS’19)
    Montreal, Canada, April 2019 [pdf]
  • Steffen Bondorf, Binbin Chen, Jonathan Scarlett, Haifeng Yu, Yuda Zhao
    Cross-Sender Bit-Mixing Coding
    In Proceedings the International Conference on Information Processing in Sensor Networks (IPSN’19)
    Montreal, Canada, April 2019 [pdf]
  • Yao Chen, Jiong He, Xiaofan Zhang, Cong Hao, Deming Chen
    Cloud-DNN: An Open Framework for Mapping DNN Models to Cloud FPGAs
    In Proceedings of 27th ACM/SIGDA International Symposium on Field-Programmable Gate Arrays (FPGA’19)
    Seaside, USA, February 2019 [pdf]

2018

  • Carmen Cheh, Ahmed Fawaz, Mohammad A. Noureddine, Binbin Chen, William Temple and William H. Sanders
    Determining Tolerable Attack Surfaces that Preserves Safety of Cyber-Physical Systems
    In Proceedings of the IEEE Pacific Rim International Symposium on Dependable Computing (PRDC’18)
    Taipei, Taiwan, December 2018 [pdf]
  • Daisuke Mashima, Binbin Chen, Toby Zhou, Ramkumar Rajendran, and Biplab Sikdar
    Securing Substations through Command Authentication Using On-the-fly Simulation of Power System Dynamics
    In Proceedings of the IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm’18)
    Aalborg, Denmark, October 2018 [pdf]
  • Walid Aljoby, Xin Wang, Tom Z. J. Fu and Richard Ma
    On SDN-Enabled Online and Dynamic Bandwidth Allocation for Stream Analytics
    In Proceedings of the IEEE International Conference on Network Protocols (ICNP’18)
    Cambridge, UK, September 2018 [pdf]
  • Jiong He, Yao Chen, Tom Z. J. Fu, Xin Long, Marianne Winslett, Liang You and Zhenjie Zhang
    HaaS: Cloud-based Real-time Data Analytics with heterogeneity-aware Scheduling
    In Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS’18)
    Vienna, Austria, July 2018 [pdf]
  • Yuming Li, Rong Zhang, Xiaoyan Yang, Zhenjie Zhang and Aoying Zhou
    Touchstone: Generating Enormous Query-Aware Test Databases
    In Proceedings of the USENIX Annual Technical Conference (USENIX ATC’18)
    Boston, USA, July 2018 [pdf]
  • Ruichu Cai, Boyan Xu, Zhenjie Zhang, Xiaoyan Yang, Zijian Li and Zhihao Liang
    An Encoder-Decoder Framework Translating Natural Language to Structural Query Language
    In Proceedings of the International Joint Conference on Artificial Intelligence and European Conference on Artificial Intelligence
    (IJCAI-ECAI’18)
    Stockholm, Sweden, July 2018 [pdf]
  • Subhash Lakshminarayana and David KY Yau
    Cost-benefit analysis of moving-target defense in power grids
    In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’18)
    Luxembourg, Luxembourg, June 2018 [pdf]
  • Subhash Lakshminarayana, Jabir Shabbir Karachiwala, Sang-Yoon Chang, Girish Revadigar, Sristi Lakshmi Sravana Kumar, David KY Yau, Yih-Chun Hu
    Signal jamming attacks against communication-based train control: Attack impact and countermeasure
    In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec’18)
    Stockholm, Sweden, June 2018 [pdf]
  • Chuadhry Mujeeb Ahmed, Martin Ochoa, Jianying Zhou, Rizwan Qadeer, Carlos Murguia, Justin Ruths, and Aditya Mathur
    NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems
    In Proceedings of the ACM Asia Conference on Computer & Communications Security (AsiaCCS’18)
    Incheon, Korea, June 2018 [pdf]
  • Ahnaf Siddiqi, Nils Ole Tippenhauer, Daisuke Mashima, and Binbin Chen
    On Practical Threat Scenario Testing in an Electric Power ICS Testbed
    In Proceedings of the ACM Cyber-Physical System Security Workshop, held in conjunction with AsiaCCS (CPSS’18)
    Incheon, Korea, June 2018 [pdf]
  • Junhua Fang, Rong Zhang, Tom Z. J. Fu, Zhenjie Zhang, Aoying Zhou and Xiaofang Zhou
    Distributed Stream Rebalance for Stateful Operator Under Workload Variance
    IEEE Transactions on Parallel and Distributed Systems
    April 2018 [pdf]
  • Subhash Lakshminarayana, Fuxi Wen, David K. Y. Yau
    Trade-offs in Data-Driven False Data Injection Attacks Against the Power Grid
    In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP’18)
    Calgary, Canada, April 2018 [pdf]
  • Li Wang, Ruichu Cai, Tom Z. J. Fu, Joing He, Zijie Lu, Marianne Winslett and Zhenjie Zhang
    Waterwheel: Realtime Indexing and Temporal Range Query Processing over Massive Data Streams
    In Proceedings of the IEEE International Conference on Data Engineering (ICDE’18)
    Paris, France, April 2018 [pdf]
  • Daisuke Mashima, Aidana Serikova, Yao Cheng, and Binbin Chen
    Towards Quantitative Evaluation of Privacy Protection Schemes for Electricity Usage Data Sharing
    ICT Express (Special Issue on CI & Smart Grid Cyber Security)
    January 2018 [pdf]

2017

  • Carmen Cheh, Ken Keefe, Brett Feddersen, Binbin Chen, William G Temple, William H Sanders
    Developing models for physical attacks in cyber-physical systems
    In Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC’17)
    Dallas, USA, November 2017 [pdf]
  • William G. Temple, Yue Wu, Binbin Chen, Zbigniew Kalbarczyk
    Systems-theoretic likelihood and severity analysis for safety and security co-engineering
    In Proceedings of the International Conference on Reliability, Safety and Security of Railway Systems (RSSRail’17)
    Pistoia, Italy, November 2017 [pdf]
  • Yao Cheng, Chang Xu, Daisuke Mashima, Vrizlynn L. L. Thing, and Yongdong Wu
    PowerLSTM: Power Demand Forecasting Using Long Short-Term Memory Neural Network
    In Proceedings of the 13th International Conference on Advanced Data Mining and Applications (ADMA’17)
    Singapore, Singapore, November 2017 [pdf]
  • Daisuke Mashima, Binbin Chen, Prageeth Gunathilaka, and Edwin Tjiong
    Towards a Grid-wide, High-fidelity Electrical Substation Honeynet
    In Proceedings of the IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm’17)
    Dresden, Germany, October 2017 [pdf]
  • William G. Temple, Yue Wu, Binbin Chen, Zbigniew Kalbarczyk
    Reconciling systems-theoretic and component-centric methods for safety and security co-analysis
    In Proceedings of the 5th International Workshop on Assurance Cases for Software-intensive Systems (ASSURE’17)
    Trento, Italy, September 2017 [pdf]
  • Carmen Cheh, Binbin Chen, William G Temple, William H Sanders
    Data-driven model-based detection of malicious insiders via physical access logs
    In Proceedings of the International Conference on Quantitative Evaluation of Systems (QEST’17)
    Berlin, Germany, September 2017 [pdf]
  • Subhash Lakshminarayana, Teo Zhan Teng, David KY Yau, Rui Tan
    Optimal attack against cyber-physical control systems with reactive attack mitigation
    In Proceedings of the ACM International Conference on Future Energy Systems (e-Energy’17)
    Hong Kong, Hong Kong, May 2017 [pdf]
  • William G Temple, Bao Anh N Tran, Binbin Chen, Zbigniew Kalbarczyk, William H Sanders
    On train automatic stop control using balises: Attacks and a software-only countermeasure
    In Proceedings of the IEEE Pacific Rim International Symposium on Dependable Computing (PRDC’17)
    Christchurch, New Zealand, January 2017 [pdf]

2016

  • Prageeth Gunathilaka, Daisuke Mashima, and Binbin Chen
    SoftGrid: A Software-based Smart Grid Testbed for Evaluating Substation Cybersecurity Solutions
    In Proceedings of the 2nd ACM Workshop on Cyber-Physical System Security and Privacy (CPS-SPC)
    Vienna, Austria, October 2016 [pdf]
  • Sang-Yoon Chang, Shaoying Cai, Hwajung Seo, and Yih-Chun Hu
    Key Update at Train Stations: Two-Layer Dynamic Key Update Scheme for Secure Train Communications
    In Proceedings of the 12th EAI International Conference on Security and Privacy in Communication Networks (SecureComm)
    Guangzhou, China, October 2016
  • William G. Temple, Yuan Li, Bao Anh N. Tran, Yan Liu, and Binbin Chen
    Railway System Failure Scenario Analysis
    In Proceedings of the 11th International Conference on Critical Information Infrastructures Security (CRITIS)
    Paris, France, October 2016 [pdf]
  • Sristi Lakshmi Sravana Kumar, Sang-Yoon Chang, Sreejaya Viswanathan, and Yih-Chun Hu
    Demo: Free Data Communication Using Wireless Charging
    Demo at ACM International Conference on Mobile Systems, Applications, and Services (MobiSys)
    Singapore, Singapore, June 2016
  • Hitesh Padekar, Younghee Park, Hongxin Hu, and Sang-Yoon Chang
    Enabling Dynamic Access Control for Controller Applications in Software-Defined Networks
    In Proceedings of ACM Symposium on Access Control Models and Technologies (SACMAT)
    Shanghai, China, June 2016
  • Xinshu Dong, Sumeet Jauhar, William G. Temple, Binbin Chen, Zbigniew Kalbarczyk, William H. Sanders, Nils Ole Tippenhauer, David M. Nicol.
    The Right Tool for the Job: a Case for Common Input Scenarios for Security Assessment
    In Proceedings of the 3rd International Workshop on Graphical Models for Security (GraMSec)
    Lisbon, Portugal, June 2016
  • Subhash Lakshminarayana, Zhan-Teng Teo, Rui Tan, David Yau, Pablo Arboleya
    On False Data Injection Attacks against Railway Traction Power Systems
    The 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Toulouse, France, June 28 – July 1, 2016 [pdf]
  • Uttam Ghosh, Xinshu Dong, Rui Tan, Zbigniew Kalbarczyk, David K. Y. Yau, Ravishankar K. Iyer
    A Simulation Study on Smart Grid Resilience under Software-Defined Networking Controller Failures
    The 2nd Cyber-Physical System Security Workshop (CPSS 2016), co-located with AsiaCSS. Xi’an, China, May 2016
  • Rui Tan, Hoang Hai Nguyen, Eddy. Y. S. Foo, Xinshu Dong, David K. Y. Yau, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Hoay Beng Gooi.
    Optimal False Data Injection Attack against Automatic Generation Control in Power Grids
    In Proceedings of The 7th ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS)
    Vienna, Austria, April 2016 [pdf]
  • Sang-Yoon Chang, Younghee Park, Akshaya Muralidharan
    Fast Address Hopping at the Switches: Securing Access for Packet Forwarding in SDN
    In Proceedings of IEEE/IFIP Network Operations and Management Symposium (NOMS)
    Istanbul, Turkey, April 2016
  • Quyen Dinh Vu, Rui Tan, David K. Y. Yau
    On Applying Fault Detectors against False Data Injection Attacks in Cyber-Physical Control Systems
    In Proceedings of The 35th Annual IEEE International Conference on Computer Communications (INFOCOM’16)
    San Francisco, CA, USA, April 2016
  • Younghee Park, Sang-Yoon Chang, and Lavanya M. Krishnamurthy
    Watermarking for Detecting Freeloader Misbehavior in Software-Defined Networks
    In Proceedings of  IEEE International Conference on Computing, Networking and Communications (ICNC)
    Hawaii, USA, February 2016
  • Girisha De Silva, Binbin Chen, and Mun Choon Chan
    Collaborative Cellular Tail Energy Reduction: Feasibility and Fairness
    In Proceedings of The 17th International Conference on Distributed Computing and Networking (ICDCN’16)
    Singapore, January 2016

2015

  • Sang-Yoon Chang, Bao Anh N. Tran, Yih-Chun Hu, Douglas L. Jones
    Jamming with Power Boost: Leaky Waveguide Vulnerability in Train Systems
    In Proceedings of IEEE 21st  International Conference on Parallel and Distributed Systems (ICPADS)
    Melbourne, Australia, December 2015
  • Yaoqi Jia, Yue Chen, Xinshu Dong, Prateek Saxena, Jian Mao, Zhenkai Liang
    Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning
    Computers & Security
    Volume: 55, November 2015
  • Sumeet Jauhar, Binbin Chen, William G. Temple, Xinshu Dong, Zbigniew Kalbarczyk, William H. Sanders and David M. Nicol
    Model-Based Cybersecurity Assessment with NESCOR Smart Grid Failure Scenarios
    In Proceedings of 21st IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2015)
    Zhangjiajie, China, November 2015 [pdf]
  • Sang-Yoon Chang, Jemin Lee, and Yih-Chun Hu
    Noah: Keyed Noise Flooding for Wireless Confidentiality
    In Proceedings of ACM International Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet)
    Cancun, Mexico, November 2015
  • Hoang Hai Nguyen, Rui Tan, David K. Y. Yau
    Impact of Signal Delay Attack on Voltage Control for Electrified Railways
    In Proceedings of IEEE Region 10 Conference (TENCON)
    Macau,  November 2015
  • Binbin Chen, Christoph Schmittner, Zhendong Ma, William G. Temple, Xinshu Dong, Douglas L. Jones, and William H. Sanders
    Security Analysis of Urban Railway Systems: The Need for a Cyber-Physical Perspective
    In Proceedings of the 2nd International workshop on the Integration of Safety and Security Engineering (ISSE’15) co-located with International conference on computer safety, reliability & security (Safecomp’15)
    Delft, Netherlands, September 2015
  • Sang-Yoon Chang, Yih-Chun Hu, and Zhuotao Liu
    Securing Wireless Medium Access Control Against Insider Denial-of-Service Attackers
    In Proceedings of IEEE Conference on Communications and Network Security (CNS)
    Florence, Italy, September 2015
  • Binbin Chen
    Invited Paper: Integrative Security Assessment of Cyber-Physical Systems
    In Proceedings of 12th IEEE Asia Pacific Wireless Communications Symposium (IEEE VTS APWCS’15)
    Singapore, August 2015
  • Yuda Zhao, Haifeng Yu and Binbin Chen
    Near-Optimal Communication-Time Tradeoff in Fault-Tolerant Computation of Aggregate Functions
    Accepted for Publication in Springer Distributed Computing Journal
    2015
  • Rui Tan, Varun Badrinath Krishna, David K. Y. Yau, Zbigniew Kalbarczyk
    Integrity Attacks on Real-Time Pricing in Electric Power Grids
    ACM Transactions on Information and System Security (TISSEC)
    Volume: 18, Issue: 2, July 2015
  • Sheng-Yuan Chiu, Hoang Hai Nguyen, Rui Tan, David K. Y. Yau, Deokwoo Jung
    JICE: Joint Data Compression and Encryption for Wireless Energy Auditing Networks
    In Proceedings of The 12th IEEE International Conference on Sensing, Communication, and Networking (SECON)
    Seattle, USA, June 2015
  • Jongho Won, Chris Y. T. Ma, David K. Y. Yau, and Nageswara S. V. Rao
    Privacy-Assured Aggregation Protocol for Smart Metering: A Proactive Fault-Tolerant Approach
    IEEE / ACM Transactions on Networking (ToN)
    Volume: PP, Issue: 99, May 2015
  • Xinshu Dong, Hui Lin, Rui Tan, Ravishankar K. Iyer, Zbigniew Kalbarczyk
    Software-Defined Networking for Smart Grid Resilience: Opportunities and Challenges
    In Proceedings of The 1st Cyber-Physical System Security Workshop (CPSS)
    Singapore, April 2015
  • William Zegers, Sang-Yoon Chang, Younghee Park, and Jerry Gao
    A Lightweight Encryption and Secure Protocol for Smartphone Cloud
    In Proceedings of IEEE International Workshop on Internet-based Virtual Computing (IVCE)
    San Francisco, US, April 2015
  • Chris Y. T. Ma; David K. Y. Yau
    On Information-theoretic Measures for Quantifying Privacy Protection of Time-series Data
    In Proceedings of 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS)
    April 2015
  • Nageswara S. V. Rao, Stephen W. Poole, Chris Y. T. Ma, Fei He, Jun Zhuang, and David K. Y. Yau
    Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models
    In Proceedings of Risk Analysis
    April 2015
  • Sang-Yoon Chang, Yih-Chun Hu, and Nicola Laurenti
    SimpleMAC: A Simple Wireless MAC-Layer Countermeasure to Intelligent and Insider Jammers
    IEEE/ACM Transactions on Networking
    2015

2014

  • Jinzhu Chen, Rui Tan, Guoliang Xing, Xiaorui Wang
    PTEC: A System for Predictive Thermal and Energy Control in Data Centers
    In Proceedings of The 35th IEEE Real-Time Systems Symposium (RTSS), cyber-physical systems track
    Rome, Italy, December 2014
  • Nils Ole Tippenhauer, William G. Temple, An Hoa Vu, Binbin Chen, David M. Nicol, Zbigniew Kalbarczyk, and William H. Sanders
    Automatic Generation of Security Argument Graphs
    In Proceedings of the IEEE Pacific Rim International Symposium on Dependable Computing (PRDC’14)
    Singapore, November 2014
  • Ziling Zhou, Binbin Chen, and Haifeng Yu
    Understanding RFID Counting Protocols
    IEEE/ACM Transactions on Networking (ToN)
    Volume: PP, Issue: 99, October 2014
  • Yuda Zhao, Haifeng Yu and Binbin Chen
    Near-Optimal Communication-Time Tradeoff in Fault-Tolerant Computation of Aggregate Functions
    In Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC’14)
    July 2014
  • Binbin Chen, Haifeng Yu, Yuda Zhao, and Phillip Gibbons
    The Cost of Fault Tolerance in Multi-Party Communication Complexity
    In the Journal of the ACM (JACM)
    Volume: 61, Issue: 3, May 2014
  • Hoang Hai Nguyen, Rui Tan, David K. Y. Yau
    Safety-Assured Collaborative Load Management in Smart Grids
    In Proceedings of the 5th ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS’14)
    Berlin, Germany, April 2014
  • Jongho Won, Chris Y. T. Ma, David K. Y. Yau, and Nageswara S. V. Rao
    Proactive Fault-Tolerant Aggregation Protocol for Privacy-Assured Smart Metering
    In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM’14)
    Toronto, Canada, April 2014
  • An Hoa Vu, Nils Ole Tippenhauer, Binbin Chen, David M. Nicol, and Zbigniew Kalbarczyk
    CyberSAGE: A Tool for Automatic Security Assessment of Cyber-Physical Systems
    In Proceedings of the International Conference on Quantitative Evaluation of SysTems (QEST’14)
    2014

2013

  • Sang-Yoon Chang, Yih-Chun Hu, and Jerry T. Chiang
    Redundancy Offset Narrow Spectrum: Countermeasure for Signal-Cancellation Based Jamming
    In Proceedings of ACM International Symposium on Mobility Management and Wireless Access (MobiWAC)
    Barcelona, Spain, November 2013
  • Rui Tan, Varun Badrinath Krishna, David K. Y. Yau, and Zbigniew Kalbarczyk
    Impact of Integrity Attacks on Real-Time Pricing in Smart Grids
    In Proceedings of the ACM Conference on Computer and Communications Security (CCS’13)
    Berlin, Germany, November 2013
  • William G. Temple, Binbin Chen, and Nils Ole Tippenhauer
    Delay Makes a Difference: Smart Grid Resilience Under Remote Meter Disconnect Attack
    In Proceedings of the IEEE International Conference on Smart Grid Communications (SmartGridComm’13)
    Vancouver, Canada, October 2013 [pdf]
  • Binbin Chen, Zbigniew Kalbarczyk, David M. Nicol, William H. Sanders, Rui Tan, William G. Temple,
    Nils Ole Tippenhauer, An Hoa Vu, and David K. Y. Yau
    Go with the Flow: Toward Workflow-Oriented Security Assessment
    In Proceedings of the New Security Paradigms Workshop (NSPW’13)
    Banff, Canada, September 2013 [pdf]
  • Xin Lou, David K. Y. Yau, Hoang Hai Nguyen, and Binbin Chen
    Profit-Optimal and Stability-Aware Load Curtailment in Smart Grids
    IEEE Transactions on Smart Grid
    Volume: 4, Issue: 3, Pages: 1411 – 1420, September 2013 [pdf]
  • Fei He, Jun Zhuang, Nageswara S. V. Rao, Chris Y. T. Ma, and David K. Y. Yau
    Game-Theoretic Resilience Analysis of Cyber-Physical Systems
    In Proceedings of the 1st IEEE International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA’13)
    Taipei, Taiwan, August 2013 [pdf]
  • Nageswara S. V. Rao, Stephen W. Poole, Chris Y. T. Ma, Fei He, Jun Zhuang, and David K. Y. Yau
    Cyber and Physical Information Fusion for Infrastructure Protection: A Game-Theoretic Approach
    In Proceedings of the International Conference on Information Fusion (Fusion’13)
    Istanbul, Turkey, July 2013
  • Nils Ole Tippenhauer, Luka Malisa, Aanjhan Ranganathan, and Srdjan Capkun
    On Limitations of Friendly Jamming for Confidentiality
    In Proceedings of the IEEE Symposium on Security and Privacy (S&P’13)
    San Francisco, CA, USA, May 2013 [pdf]
  • Chris Y. T. Ma, David K. Y. Yau, Xin Lou, and Nageswara S. V. Rao
    Markov Game Analysis for Attack-Defense of Power Networks under Possible Misinformation
    IEEE Transactions on Power Systems
    Volume: 28, Issue: 2, Pages: 1676 – 1686, May 2013 [pdf]
  • Jerry T. Chiang and Yih-Chun Hu
    Did You Also Hear That?  Spectrum Sensing Using Hermitian Inner Product
    In Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM’13), Turin, Italy, April, 2013 [pdf]
  • Chris Y. T. Ma, David K. Y. Yau, and Nageswara S. V. Rao
    Scalable Solutions of Markov Games for Smart-Grid Infrastructure Protection
    IEEE Transactions on Smart Grid, Special Section on Smart Grid Communications Systems: Reliability, Dependability, and Performance
    Volume: 4, Issue: 1, Pages: 47 – 55, March 2013 [pdf]
  • Dennis E. Phillips, Rui Tan*, Mohammad-Mahdi Moazzami, Guoliang Xing, Jinzhu Chen, David K. Y. Yau
    Supero: A Sensor System for Unsupervised Residential Power Usage Monitoring
    In Proceedings of The 11th IEEE International Conference on Pervasive Computing and Communications (PerCom)
    San Diego, CA, USA, March  2013,  [pdf]

2012

  • Jinzhu Chen, Rui Tan, Yu Wang, Guoliang Xing, Xiaorui Wang, Xiaodong Wang, Bill Punch, Dirk Colbry
    A High-Fidelity Temperature Distribution Forecasting System for Data Centers
    In Proceedings of The 33rd IEEE Real-Time Systems Symposium (RTSS), cyber-physical systems track
    San Juan, Puerto Rico, December 2012
  • Rui Tan, Guoliang Xing, Xue Liu, Jianguo Yao, Zhaohui Yuan
    Adaptive Calibration for Fusion-based Cyber-Physical Systems
    ACM Transactions in Embedded Computing Systems (TECS)
    Volume: 11, Issue: 4, December 2012
  • Jinzhu Chen, Rui Tan, Guoliang Xing, Xiaorui Wang, Xing Fu
    Fidelity-Aware Utilization Control for Cyber-Physical Surveillance Systems
    IEEE Transactions on Parallel and Distributed Systems (TPDS), special issue on cyber-physical systems
    Volume: 23, Issue: 9, Pages: 1739 – 1751, September 2012
  • Binbin Chen, Haifeng Yu, Yuda Zhao, and Phillip Gibbons
    The Cost of Fault Tolerance in Multi-Party Communication Complexity
    In Proceedings of 31st Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC’12)
    Madeira, Portugal, July 2012 [pdf]
  • Chris Y. T. Ma, David K. Y. Yau, Xin Lou, and Nageswara S. V. Rao
    Extended Abstract: Markov Game Analysis for Attack and Defense of Power Networks
    In Proceedings of the International Conference on Applied Cryptography and Network Security (ACNS’12) (Industrial Track)
    Singapore, June 2012 [pdf]
  • Jerry T. Chiang, Dongho Kim, and Yih-Chun Hu
    JIM-Beam: Using Spatial Randomness to Build Jamming-Resilient Wireless Flooding Networks
    In Proceedings of the Thirteenth International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’12), Hilton Head Island, SC, USA, June, 2012 [pdf]

2011

  • Nageswara S. V. Rao, Chris Y. T. Ma, and David K. Y. Yau
    On Robustness of A Class of Cyber-Physical Network Infrastructures
    In Proceedings of the 1st IEEE Workshop on Design, Modeling and Evaluation of Cyber Physical Systems (CyPhy’11), in conjunction with IEEE IWCMC
    Istanbul, Turkey, July 2011 [pdf]
  • Chris Y. T. Ma, Nageswara S. V. Rao, and David K. Y. Yau
    A Game Theoretic Study of Attack and Defense in Cyber-Physical Systems
    In Proceedings of the 1st International Workshop on Cyber-Physical Networking Systems (CPNS’11), in conjunction with IEEE INFOCOM
    Shanghai, China, April 2011 [pdf]